Network security setting
| Main Authors: | Shah, Asadullah, Shaikh, Asadullah, Alshaikhli, Imad Fakhri Taha |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/22366/ http://irep.iium.edu.my/22366/1/13.pdf |
Similar Items
Basic operating system setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Windows installation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Task scheduling
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Basic storage management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Windows explorer
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Folder and directory
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Control panel and screen savers
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Hardware configuration
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image editing
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image tool function
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image clone 1
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image clone 2
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image and special effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Basic text effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Text animation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Text effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image filtering
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image quality improvement
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Internal structure of computer systems
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Interfaces and protocols
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Firmware program
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Graphical user interfaces
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Short cut and hard drive
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Logical drive
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Storage management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Basic disk management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Disk management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Cascade style sheets
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
The use of genetic algorithm in autonomous robot navigation
by: Hassan, Raini, et al.
Published: (2011)
by: Hassan, Raini, et al.
Published: (2011)
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)
by: Alahmad, Mohammad, et al.
Published: (2012)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Frequencies determination of characters for Bahasa Melayu:
results of preliminary investigation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
10 c’s of social networking, interconnections and
the impact on social networking
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
Control panel of an oscilloscope
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Similar Items
-
Basic operating system setting
by: Shah, Asadullah, et al.
Published: (2011) -
Windows installation
by: Shah, Asadullah, et al.
Published: (2011) -
Task scheduling
by: Shah, Asadullah, et al.
Published: (2011) -
Basic storage management
by: Shah, Asadullah, et al.
Published: (2011) -
Windows explorer
by: Shah, Asadullah, et al.
Published: (2011)